Skip to main content

iDJ: Intrusion Detection System in Java

  • Conference paper
  • First Online:
Next Generation Computing Technologies on Computational Intelligence (NGCT 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 922))

Included in the following conference series:

  • 323 Accesses

Abstract

In today’s world where the crime rates are increasing exponentially, human safety and security is of utmost importance. Confidentiality is a demand of each and every person in terms of physicality and digitally. Every person can and should have the knowledge to defend himself against unwanted intrusions and this Security System is a simple step in that direction. Access to Technology such as laptops, tablets and smartphone cannot be easier in today’s generation. This System can be used by anyone and everyone who has basic coding knowledge without the need for any additional and expensive hardware and that to minimal cost and that too effectively. Every breach of security carries with itself a new and innovative method to counter the existing security measures and hence we have tried to provide the users with the maximum amount of performance and capability that any Security system would need with minimal cost and resources in an easy-to-understand manner. Using this System the user will have the capability to detect an Intrusion via its three main Security Algorithms implemented in Java. Additional features such as automated mailing and Live streaming will help in enhancing the System. Also features such as user verification via OTP (One time Password) are also a part of the System.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. https://www.safewise.com/best-home-security-system

  2. Common Criteria version 2.1 (Part 1: Intro & General Model, Part 2: Functional Requirements, Part 3: Assurance Requirements). ISO/IEC 15408. http://www.commoncriteria.org. Accessed 09 Mar 2001

  3. Glossary of Computer Security Terms (ìTeal Green Bookî). National Computer Security Center, NCSC-TG-004, 52 p. (1988). http://www.radium.ncsc.mil/tpep/library/rainbow/index.html. Accessed 09 Mar 2001

  4. Fournier, R.: A Methodology for Client/Server and Web Application Development. Prentice Hall, Inc., 648 p. (1999)

    Google Scholar 

  5. Security in Open Systems. NIST Special Publication 800-7, US Department of Commerce, 300 p. (1994)

    Google Scholar 

  6. Udemy – Complete Course on Face Detection in Java

    Google Scholar 

  7. Oracle Java – The Complete Reference, 5th edn

    Google Scholar 

  8. http://webcam-capture.sarxos.pl/ - WebCam Capture API

  9. https://github.com/sarxos/webcam-capture - WebCam Capture API

  10. https://software.intel.com/en-us/articles/sound-detector - Sound Sensing Using Javax Sound

  11. https://opencv.org/ - OpenCV Library

  12. Howard, J.D.: An Analysis of Security Incidents on the Internet 1989 to 1995. Carnegie Mellon University, 246 p. (1997)

    Google Scholar 

  13. Department of Defense Trusted Computer System Evaluation Criteria (“Orange Book”). US Department of Defense standard, DoD 5200.28-std., 116 p. (1985). http://www.radium.ncsc.mil/tpep/library/rainbow/index.html. Accessed 09 Mar 2001

  14. Trusted Network Interpretation of the TCSEC (ìRed Bookî). National Computer Security Center, NCSC-TG-005, 332 p. (1987). http://www.radium.ncsc.mil/tpep/library/rainbow/index.html. Accessed 09 Mar 2001

  15. Gollmann, D.: Computer Security. Wiley, 320 p. (1999)

    Google Scholar 

  16. Schneier, B.: Applied Cryptography, 2nd edn. Wiley, 758 p. (1996)

    Google Scholar 

  17. Stallings, W.: Cryptography and Network Security, Principles and Practise, 2nd edn. Prentice Hall, Inc., 569 p. (1999)

    Google Scholar 

  18. Krause, M., Tipton, H.: Handbook of Information Security Management, 4th edn. Auerbach Publications, 728 p. (1999)

    Google Scholar 

  19. Integrity in Automated Information Systems. National Computer Security Center Report 79-91 (1991)

    Google Scholar 

  20. Information Technology - Open System Interconnection - The Directory: Authentication Framework. Recommendation X.509. ISO/IEC 9594-8, 34 p. (1993)

    Google Scholar 

  21. Dierks, T., Allen, C.: The TLS Protocol, Version 1.0. RFC 2246. IETF (1999). http://www.ietf.org/rfc/rfc2246.txt. Accessed 23 Mar 2001

  22. SSL Protocol Version 3.0. http://home.netscape.com/eng/ssl3/ssl-toc.html. Accessed 02 Jan 2001

  23. Lindholm, T., Yellin F.: The Java Virtual Machine Specification, 2nd edn. Addison Wesley, Inc., 473 p. (1999)

    Google Scholar 

  24. The Java Platform, A White Paper, Douglas Kramer, May 1996. Sun Microsystems. http://java.sun.com/docs/white/index.html. Accessed 09 Mar 2001

  25. Venners, B.: Inside the Java 2 Virtual Machine. McGraw-Hill, Inc., 703 p. (1999)

    Google Scholar 

  26. Chen, E.: Poison Java. IEEE Spectrum, pp. 38–43, August 1999

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Radhesh Khanna or Shashank Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Khanna, R., Sharma, S. (2019). iDJ: Intrusion Detection System in Java. In: Prateek, M., Sharma, D., Tiwari, R., Sharma, R., Kumar, K., Kumar, N. (eds) Next Generation Computing Technologies on Computational Intelligence. NGCT 2018. Communications in Computer and Information Science, vol 922. Springer, Singapore. https://doi.org/10.1007/978-981-15-1718-1_20

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-1718-1_20

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-1717-4

  • Online ISBN: 978-981-15-1718-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics